COMMERCIAL
[2009 No. 5472 P]
BETWEEN
EMI RECORDS (IRELAND) LIMITED, SONY MUSIC ENTERTAINMENT
IRELAND LIMITED, UNIVERSAL MUSIC IRELAND LIMITED, WARNER
MUSIC IRELAND LIMITED AND WEA INTERNATIONAL
INCORPORATED
PLAINTIFFS
AND
UPC COMMUNICATIONS IRELAND LIMITED
DEFENDANT
customer use policy of UPC makes it very clear that the internet
service of UPC cannot be used to steal copyright material. This is
a matter of contract, and for a breach of this obligation by the
customer, UPC can terminate the contract. It never does. It is
not so inclined.
5. At the end of their amended statement of claim, the recording
companies are specific only to this extent as to what they seek:-
“1. An injunction, pursuant to s. 37 and s. 40(4) of the Copyright
and Related Rights Act, 2000, restraining the defendant
internet service provider from infringing the copyright in
sound recordings owned by, or exclusively licensed to, the
plaintiffs by making available to the public copies of those
sound recording without the plaintiffs’ consent using its
internet service facilities.
2. Without prejudice to the generality of the foregoing order, an
order pursuant to s. 40(4) of the Copyright and Related Rights
Act, 2000 that the defendant block or otherwise disable
access by its subscribers to the website thePirateBay.org and
related domain names, IP addresses and URL’s, as set out in
the schedule hereto attached, together with such other
domain names, IP addresses and URL’s as may reasonably be
notified as related domain names by the plaintiffs’ to the
defendant from time to time.”
6. Preferably, the recording companies seek a three strike solution:
they would monitor the internet for infringements, inform UPC
who then would be required on each occasion of breach of
copyright to warn the infringer, up to three times, and then to
discontinue service. In the alternative, blocking and diversion
equipment is sought to be imposed on UPC by court order. These
alternatives are later described in detail.
7. In defending this claim, UPC state that there is no liability in law
for acting as a mere conduit for copyright infringement, and that
it neither initiated the communication involved in piracy, chose
the recipient, altered the information nor condoned the activity.
In other words, sections 37, permitting an injunction, and 40(4)
of the Copyright and Related Rights Act 2000 (“the Act”),
4
Economic Issues
18. The evidence establishes definitively that copyright is being
infringed on the UPC network. I do not accept any of the
evidence from UPC as to its unawareness of this process. Nor do
10
I accept that it has not thought about this issue and considered
whether it is making a profit from it.
19. More widely, however, internet piracy is an economic and a
moral problem. Were men to walk into a cinema and in the dark,
set up a small tripod for a machine to digitally record the latest
movie blockbuster, to use the appropriate colloquial terminology,
most right thinking people would be appalled. To entertain
themselves and their families at home, they would have to wait
three or four months to buy the DVD on its release and spend
about €15 to have the film and whatever extras were added on
to make it attractive. It is hardly credible that cinema owners
would not be aware of this problem taking place. If they did
nothing, and allowed people to proceed with illegally capturing
the film, the first step would have been taken with their
acquiescence in the undermining of copyright. Attendance at the
film would plummet, because a group of friends would be drawn
into deciding that a cheaper alternative for say five or ten of
them, instead of having to spend between €50 and €100 on
cinema admission, would be to buy a pirated copy of the film and
watch it in the comfort of their home on the now almost
ubiquitous flat screen television of large size that graces our
home life. If nothing were done about the men, their camera and
their tripod, their digital reproduction equipment and their sales,
on the release of the DVD of the film, legal purchases would be
minimal. Similarly, in the week of commencing writing this, the
National Youth Orchestra of Ireland presented a stirring new
composition, ‘Summer Overture’ by Shaun Davey, in the National
Concert Hall. . Nowadays it is possible to attend a concert and to
have CDs of it legally for sale fifteen minutes after conclusion. A
person could covertly capture the music on a small digital
recorder. If that individual went out to a van in which he had a
great deal of digital copying equipment, reproduced it without
permission and sold the CDs to those leaving the concert, it
would rightly be regarded as flagrant abuse of copyright. I
cannot see how an illegal recording on site and the subsequent
public or internet offering for free, with no return to the
11
Internet Access
23. The internet consists of millions of linked computers. The
principal points of linkage are internet service providers, of which UPC
is one. Those who subscribed to broadband access are provided with a
cable modem that gives an Ethernet connection. Many of UPC’s
customers subscribe for voice telephony, television and internet access
over this connection. Through a wireless router, internet service can be
used within the range of the wireless router, provided the appropriate
customer identification number, supplied by UPC to the customer, is
keyed into the computer. For UPC, the cable modem is identified and
authorized through a MAC address. This is registered in UPC to a
particular customer at a particular place and also records the kind of
service to be paid for and the level of service for internet broadband
access that is allowable in accordance with the fee paid. The separate
IP address is assigned from day to day by UPC, as internet service
provider. They alone know the identity of the customer using that IP
address at any particular time. Because there are millions of IP
addresses, no one apart from UPC, merely having the IP address that
was used to infringe copyright can discover the identity of infringing
subscribers. Anyone can find out the banks millions of numbers
assigned to particular internet service providers; but that is all that can
be learned.
24. When the cable modem of a UPC connected computer boots up,
UPC will verify that the MAC address is assigned to the correct cable
modem, it will allocate a temporary IP address for the boot process, it
will check on the profile of the service subscribed for in accordance
with what the customer has paid for, it will then access the internet
13
and the customer can proceed. The customer will have contracted to
use the service in accordance with the Acceptable Usage Policy of UPC.
The boot up process includes the collection of log information that
records the IP addresses allocated to the customer’s equipment,
identified by the MAC address, and the relevant time.
25. UPC employs sophisticated monitoring and management tools.
In particular, the bandwidth usage of the customer is monitored.
Traffic monitoring, classification, and the enforcement of acceptable
usage, is done through Cisco SCE8000 Systems. This performs a
classification of the total aggregated traffic.
26. The use which a customer makes of their broadband facility is
reported on through the ServAssure Programme that is run at the end
of every month. This data refers to MAC addresses, because there is no
need to refer to IP addresses in this context, since the MAC address is
not movable for this purpose. UPC then manually cross references that
data with the customer database whereby account details are
determined and checked. The data is then cross referenced to another
manual database to determine whether or not the account holder has
had previous warnings on an excess use of bandwidth beyond what
they have paid for. Following this exercise the account holder, if using
excessive bandwidth, will receive either a first or second warning. In
practice, as I understand it, once a warning is given, and bandwidth
usage does not cease, the customer is billed up a level to the next
highest, or above, bandwidth payment structure. The Acceptable
Usage Policy, which I will turn to shortly, allows customers to be cut off
for using excessive bandwidth. However, I understand from the
evidence of Anna Coyle, who is in charge of billing within UPC, that the
current policy is to retain valuable customers and to persuade them to
move up to a higher bandwidth and pay more money. This is done by
warning them and then just billing them at the higher bandwidth.
People are not cut off in respect of this, there are simply sent a higher
bill. To some extent the evidence is confusing as to whether one or two
warnings are given, depending upon the package that the customer
has contracted for. The evidence is clear, however, that UPC pursue a
policy of retaining customers and requiring them to pay more by
reference to the Acceptable Usage Policy whereby if they use more
14
than they have contracted for, they are required to pay in accordance
with the level billed. Those who do not pay are cut off. There is no
negotiation on this issue.
27. Traffic monitoring, through deep packet inspection, is used by
UPC to shape traffic. The current policy is based on a general shaping
of peer-to-peer traffic. This uses different levels for upstream and
downstream. The shaping is applied to the total aggregated traffic and
is not targeted at any individual user. The thresholds are statistically
defined and can be changed through input. This shaping is applied to
peer-to-peer traffic, to reduce its potential for domination of the
network, during peak hours for computer usage which are daily from
17.00 to 24.00. In off peak hours, which coincide in part with business
hours, no shaping occurs.
28. The nature of peer-to-peer traffic has been described in
evidence in technical terms. I wish to give a brief description here.
Professor Paddy Nixon, of University College Dublin, told me that the
relevant studies showed an analysis of internet traffic that was 70%
peer-to-peer in Eastern Europe and 56% in Western Europe. As to
encrypted peer-to-peer traffic, while some reports put that level as well
over 25%, the studies referred to in evidence showed it at 20% or just
under. Peer-to-peer networks are established using appropriate
technologies, such as BitTorrent, whereby each participant becomes
both a downloader of material and an uploader. The principles applied
in legal peer-to-peer file sharing and illegal peer-to-peer file sharing are
the same. A lengthy musical, or other, work would be split up into
thousands of digital parcels, each one of which carries an identifying
code which indicates that it is a particular track. This can be checked
by anyone over the internet through DtecNet whereby identification
can be made to the particular IP address that is engaged in the process
of uploading/downloading copyright material without permission.
Whereas a suggestion was made by counsel during the course of the
case, that these file # numbers degrade over time that was not backed
up by any evidence. A participant, having downloaded the relevant
software for free over the internet, such as eDonkey, or Gnutella, will
find out on a site where a particular track is available and then join his
computer, through the internet service provider, to a swarm of
15
Solution I: Detection
34. The IP address of those engaging in the peer-to-peer
uploading/downloading of copyright material can be discovered easily and
accurately. DtecNet software is a process which was described in evidence
by Thomas Sehested. In essence, by checking with Résaux IP Européens
(“RIPE”), an organisation based in Paris, a list of IP addresses provided to
internet service providers in Europe is obtained. Digital files of copyright
material are then obtained from the owners. There may be several
thousand of these obtained directly from the record companies. As the
download is proceeding through the system it carries the IP address of
18
those who are downloading material. DtecNet does what any user of a
peer-to-peer network does in order to obtain a download. No extra
information is obtained. The fact of the download together with IP address,
the digital information identifying the copyright material and the time or
the crucial data is obtained. DtecNet searches peer-to-peer networks for
files being uploaded which are subject to copyright. On finding such a file,
DtecNet requests the file. This is then transmitted to, and copied, by
DtecNet’s computer. It is integral to this process that basic information
about the uploader from whom the work is being transmitted is obtained.
The examples produced in Court show that the user’s pseudonym and the
IP address of the user appears together with the relevant time, date and
identification of the copyright material. As part of this process, if the IP
address was registered to an Irish internet service provider, DtecNet
identified how many sound recordings were being made available by that
user on peer-to-peer software. A list of the files was then captured in the
form of a log containing the name, size and hash value of user’s shared
files. Although a music file may be split up in several hundred pieces, each
of them carries a sufficient identification through the file # for it to be
fitted into an appropriate order of sense and sufficient to clearly identify
that it is a portion of a work which is subject to copyright. In all of the
examples of which the Court was provided evidence, there is nothing to
suggest that if only a tiny portion of the work was being uploaded that that
would be insufficient to identify it. Rather, what peer-to-peer involves is
obtaining the entire music recording that is desired. The file # identifier
ensures that it is put into a correct format and order. The process of
DtecNet is automatic, in the sense that the handshake between the
computers, in peer-to-peer terminology, is fully automated. The search for
particular files, for example the 1,000 most popular songs relevant to the
recording companies, at that time, is inputted for the purpose of search. I
am satisfied that from the evidence that the process is highly accurate.
The activity log further transcribes the activity whereby the evidence is
secured in a reliable format. There was nothing in the evidence to suggest
to me that this process was subject to any degree of substantial error.
Furthermore, the evidence establishes that there is a substantial problem
on the UPC network with copyright piracy. Various figures on a monthly or
annual basis were produced in Court. These related to an estimate of
19
15,000 per month, on a test run by DtecNet on 350 random tracks from a
list of 10,000 U.K., Irish and internationally popular tracks. An
extrapolation was made that at their peak downloads were likely to reach
around 47,000 per month. These, however, are individual incidents. A
person may be downloading a number of tracks in a single sitting, as it
were, at their computer. A person may go back and download on their
computer a number of times in the day. They may leave their computer on
all day, downloading continually. It is highly unlikely that a person who
enjoys an experience, having done it once, will simply desist. The figures
produced by Ms. Sheehy speak for themselves. If, therefore, one is
responding on a month-by-month basis, while it is difficult to say how
many individual infringers one may be dealing with, it is certainly a small
fraction of 47,500. Returning again to the figures mentioned by Ms.
Sheehy on previous tests, it is apparent that there are likely to be, at
most, some few thousand of them. Of them, perhaps a hundred or so will
be the leaders in culpability. These few people are the ones who need to
be processed. It is also apparent that the recording companies are going
to have to make a choice in the implementation of any injunctive relief
which they are seeking, whereby the worst infringers, namely those who
download most frequently or who have the most illegally copied material
on offer, will be prioritised
35. There are two potential methods of evading the DtecNet process.
The first is by the use of proxy IP addresses. A sophisticated computer
technician could hack into another person’s computer, and then request
files using peer-to-peer technology. They would be downloaded to the
second computer via peer-to-peer technology and, as I understand, then
directly download it, bypassing peer-to-peer communications, and
therefore DtecNet, back to the original computer user. A second way
would involve using another computer as a proxy server. There are some
free sites, as I understand the evidence, offering this service. There are, in
addition, ways of paying for the hire of another computer so that this
process can be engaged in. The figures that I have obtained from Mr.
Sehested in evidence indicate to me that the current use of this
technology to avoid the ultimate IP address that the user resides on is now
around 0.3%. With any solution, there will be a technology battle, whereby
20
50. I am not satisfied that the attitude of UPC toward the illegal sharing
of copyright material over the internet is either reasonable or fair. I
believe that the two witnesses who gave evidence on behalf of UPC, Anna
Coyle and Conor Harrison, were intentionally placed by their employer in
an impossible position. They are not the controlling minds behind UPC in
Ireland. They do not set UPC policy. In the light of all the evidence, I
accept what Dick Doyle, on behalf of the recording companies said in
relation to the description as to its services offered by UPC in a magazine
entitled “Fusion, Issue No. 3”. This offers various broadbands speeds,
under the titles of Fiber 5, Fiber 15 and Fiber 30. It is a dubious
encouragement to purchase internet access. This is a domestic offering, it
should be noted, not a commercial one. The offering is a commercial use
of internet piracy and an encouragement of it. The following quote
appears that describes the service:-
“Fiber 15:
A download speed of 15Mb is suitable for users who regularly
download or send large files such as music or movies. This speed
also supports online gamers and video calling, which is becoming
more and more popular with our customers. An ideal pack for
families.”
51. The Court regards this, in accepting Mr Doyle’s evidence as
accurate, as the exploitation by UPC of the difficulties of the recording
companies with piracy. On its own, this could be regarded as offering
increased bandwidth for legal purposes, such as gaming. The
correspondence does not support that view as a probability. This view is
not taken in isolation, but is backed up by disturbing written evidence
which the UPC witness could not be expected to explain satisfactorily. The
Court’s comments, in this regard, are not ascribed to these witnesses but
to the defendant UPC, as an organization. In the context of the settlement
of the Eircom case in January 2009, the marketing manager of UPC was
sent an email on 29th January which stated:-
“We should not link what we are doing in marketing (on automatic
upgrades/disconnect) with illegal downloads. We want to distance
ourselves from this debate for as long is possible.”
Later on, there was another email within UPC at high management level:-
27
Alternatives to an Injunction
58. It is definitively established by the evidence that, without the
assistance of UPC, the recording companies cannot discover the identity of
those who are infringing their copyright. Once that IP address is
communicated to UPC as infringing copyright, by the recording companies
which find an infringement, they can readily search in respect of the time
and date, thereby finding the subscriber over whose line the infringement
took place. Whereas this process does not now appear to be automated,
there is nothing in the evidence to suggest that the ordinary application of
ingenuity to save time and money, the very essence of computer
technology, cannot readily be applied to make this search a simple and
inexpensive process. Any suggestion to the contrary in the evidence, I
reject.
59. In Norwich Pharmacal v. Custom and Excise [1974] A.C. 133, the
House of Lords in a different context, established the right of a person who
claimed that a civil wrong had been perpetrated to obtain a court order
against a party holding information that would enable the identification of
the wrongdoer. Thus, for instance, where a car accident takes place, and a
proposed plaintiff knows no more than a registration number, were this
number not publicly available, or subject somehow to confidentiality, that
proposed plaintiff could bring an action against the licensing authority to
uncover the name and address of the party alleged to be responsible for
the accident, so that an action might be brought.
60. It is established beyond doubt in this jurisdiction that Norwich
Pharmacal orders are available in the appropriate circumstances. In EMI v.
Eircom Limited [2005] 4 I.R. 148, Kelly J. made a number of orders
whereby the plaintiff in that action, who are also the recording company
plaintiffs here, compelled Eircom, as an internet service provider to
disclose the names of its infringing customers. The plaintiffs made the
case successfully that their copyright had been infringed and
demonstrated a series of IP addresses of the responsible subscriber. The
judgment of Kelly J. declares that where a wrongful activity has been
committee by unknown persons, an order may be made requiring a
defendant to identify such persons for the purposes of legal action.
31
61. In the Federal Court of Appeal in Canada case of B.M.G. Canada Inc
v. Doe [2005] FCA 193 Sexton J. speaking for the Court, said at paras. 40
to 42:-
“Intellectual Property laws originated in order to protect the
promulgation of ideas. Copyright law provides incentives for
innovators - artists, musicians, inventors, writers, performers
and marketers - to create. It is designed to ensure that ideas
are expressed and developed instead of remaining dormant.
Individuals need to be encouraged to develop their own talents
and personal expression of artistic ideas, including music. If
they are robbed of the fruits of their efforts, their incentive to
express their ideas in tangible form is diminished.
people who felt they had the right to do it and a lot of older
people told me they had the right to do it.”
64. It thus emerges from Ms. Sheedy’s evidence that in the vast
majority of cases, in this random sample of 17, 49 and 23 illegal
downloaders, between the years 2005 and 2007, that there was a
willingness to desist on being faced with the threat of court
proceedings. I take this evidence into account when considering the
graduated response solution to the problem posed by internet piracy.
65. This evidence convinces me that there is no just or convenient
solution open to the record companies other than seeking injunctive
relief against the internet service provider, in this case UPC. It is
argued by UPC, that were injunctions to be granted rights of privacy
would be infringed and that an injunction would be disproportionate to
the menace that internet piracy represents.
Privacy
66. The existence of a right to privacy is not in doubt; as Hamilton P. in
Kennedy v. Ireland [1987] I.R. 587 put it, ‘[t]he right to privacy is not an
issue, the issue is the extent of that right or the extent of that right “to be
left alone”. It has been consistently invoked in the courts over the years;
see, for example, X v. Flynn (Unreported, High Court, Costello J., 19th May,
1994) and Re Article 26 and the Employment Equality Bill 1996 [1997] 2
I.R. 321. Despite this, privacy as a right is difficult to define adequately.
The Irish courts have grappled with the scope of the right since it was first
recognised in McGee v. Attorney General [1974] I.R. 284 as an
unenumerated right, flowing from the State’s undertaking to defend and
vindicate the personal rights of every citizen under Article 40.3.1 of the
Constitution. Privacy in the modern panoptic society must be flexible
enough to address new technologies and developments and their privacy
implications while at the same time certain enough as to offer guidance
and clarity as a matter of law. Keeping this tension in mind, it is extremely
difficult to arrive at an appropriate definition. Description is therefore
preferable.
67. The right to privacy has been said to encapsulate the ‘right to be left
alone’ (per Walsh J. in his dissenting judgment as a judge of the European
Court of Human Rights in Dudgeon v. United Kingdom (1981) 4 E.H.R.R.
34
files they are not infringing. So, that information is made publicly
available [over the network anyway] so, that is fine.”
69. Mr. Sehested had a similar view. He said:-
“I mean all of the information that we capture is publicly transmitted
information that anyone with an internet communication and a
peer-to-peer programme, that is freely downloadable, would be able
to capture. Again all the files that we capture here are files that are
actively made available by the users… [i]n this case specifically we
are solely looking for sound recording. So we only look for content
that is part of that file that we have been given to monitor for.”
70. That evidence is the basis of my conclusion that the right of privacy
is not engaged by the scrutiny of files publicly made available for
copyright theft on the internet and nor is it engaged by deep packet
inspection for the purpose of detecting and diverting or disenabling such
transmissions.
Response to Warning
71. The evidence establishes that detection, Solution I, followed by
warning over three occasions and eventual discontinuance of internet
access will succeed in strongly alleviating the problem of internet piracy.
There is a strong probability that a graduated response would yield a
majority level of desistance from the practice of illegal downloading on a
first warning. In that regard, I take into account the evidence of Charles
Benjamin, of Anna Coyle, of Professor Nixon and Helen Sheehy. Within an
Irish context, the most convincing evidence I heard was that of Helen
Sheehy. In response to the Norwich Pharmacal orders, the majority of
people were described as being embarrassed that they or their family had
stolen copyright material when first communicated with. Those who were
responsible tended to admit the fact; and some were being made aware
that a practice in which they disapproved has been carried out through
family members. A survey was put to Professor Nixon whereby it was
indicated that seven out of ten people would cease internet piracy if
warned. His response, in that regard, was appropriately cautious. He noted
that there was hope that most people would alter their behaviour. Within
the realm of a university, from which perspective Mr. Benjamin spoke, the
situation is persuasive, though not precisely comparable. The result of the
37
General Record
72. The recording companies are, as a matter of preference, seeking an
injunction from the Court whereby, on a third detection of infringement, on
a month-by-month basis for each infringement, the person involved will be
barred from any internet access. There is no general register for those who
are cut off from internet service for not paying their bills. I am satisfied
from the evidence of Anna Coyle, that there is some degree of informal
communication, but that if it happens, it is rare. There is no plea in this
case that a general register should be created of those who have been
cut-off from internet access due to failure to pay a bill or due to repeated
violations of a prohibition against internet piracy. To set up such a register
may well have data protection implications. I do not need to comment on
any issues that might so arise. As the solution is now proposed, there is no
disproportionality.
38
Warning
73. A warning can be important in the adjudication of whether an
injunction is to be justly granted. Much correspondence has been
exchanged between the parties. This, on the one hand, makes the case
that the network of UPC is being used by its customers to infringe the
copyright held by the recording companies. UPC, on the other hand,
demonstrates in its written replies, a careful series of arguments to the
affect that they are merely a conduit between its customers and others.
Furthermore, they argue that the Copyright and Related Rights Act 2000
does not allow for the making of an injunction against them or require
them to take action, in respect of copyright piracy since s. 40 of the Act
declares in subs. (3) that the provision of facilities for enabling the making
available to the public of copies of a work does not of itself constitute that
action. It is where a person who provides facilities is notified by the owner
of the copyright in the work concerned, that such facilities are being used
to infringe copyright in that work, then unless the person so notified,
removes the infringing material as soon as practicable, then liability for
copyright infringement is established under subs (4). Solely at issue is
whether the recording companies have notified the UPC that its facilities
are being used to infringe copyright. As to whether this constitutes the
making available to the public of copies of a work and as to whether any of
the solutions deposited by the recording companies to peer-to-peer
internet piracy of their work constitutes a step “to remove that infringing
material” is a separate matter, dealt with later in this judgment.
74. By letter dated 13th February 2009, Helen Sheehy, on behalf of the
recording companies, made the case that the law obliged UPC to act in the
manner similar to the agreement reached with Eircom in January 2009.
The parties there contracted for a three stage response to internet piracy.
The recording companies were to alert them to infringements through the
use of DtecNet on a month-by-month basis. If, in the first month, an
infringement was notified in the appropriate format, Eircom were to write
to its customers by way of an education policy; as to the possibility of the
misuse of a network by an employee, family member or, possibly,
someone within the range of their wireless router. On a second
infringement, a sterner letter was to be written. On a third infringement,
the customer was to be disconnected as to broadband internet access, but
39
not as to telephone and television services received over the internet and
not in the case of business customers or those dependent upon the
internet for serious medical reasons.
75. By letter dated 27th February 2009 UPC declared:-
“For the avoidance of doubt UPC Ireland does not condone illegal
file sharing and our policies, procedures and terms and conditions of
service ensure that the company complies with all prevailing laws in
Ireland. UPC has recently taken legal steps to prevent various forms
of copyright infringement of content on our cable and MMDS
network, therefore, be assured we are motivated to address illegal
activity on our networks in general, including piracy and copyright
infringement. On that basis we are happy to discuss with your
clients and all other stake holders on a multilateral basis (to include
other rightholders, fellow ISPs the Data Protection Commission,
Consumer and Piracy Groups etc). Any practical initiatives that can
be taken to address the concern of the illegal file sharing within the
confines of the law. The measures proposed in your letter are,
however unacceptable and do not take account of the rights and
interests of subscribers and ISPs and we cannot agree these as a
basis for discussion. Moreover, it appears your request is that we
should simply agree to sign up to a similar private arrangement that
you have with another party…”
76. As has emerged, I am not at all satisfied that the response by UPC
was genuine. It is apparent that UPC vigorously pursue customers who
exceed the limit on their broadband package, and charge them more on a
unilateral basis in appropriate cases. This provision of their acceptable
usage policy is pursued entirely on a profit motive basis.
77. By letter dated 14th May 2009, Helen Sheehy, on behalf of the
recording companies, formally put UPC on notice, that their facilities were
being used to infringe copyright in sound recordings owned by the
recording companies. In part, the letter reads:-
“We are of the view that UPC is on notice of illegal file sharing on its
network, following upon the High Court disclosure action reference
number 4368P/2005. Since our letter to you dated the 13th February
2009 random scans of the peer-to-peer to activity on your network
show that the activity is continuing. I enclose details of random
40
80. Further information was provided from the UPC solicitor by letter
dated 26th May 2009. This time, a file of information as to the use of the
UPC network for infringing copyright material was added to the letters.
81. By letter dated 2nd June 2009, the solicitors on behalf of UPC
reiterated that their client was a mere conduit and, therefore, not liable to
injunctive relief. The letter indicated that there was a right of
communication to the public and that injunctive relief was not available
under Irish law. In particular they stated that an injunction could not be
granted on a non-individualised basis “through an unverified, automated
process”. In that regard, the Court would comment that the DtecNet
system of infringement has, as is stated elsewhere in this judgment, being
demonstrated to be accurate. Further, there was no question put which
undermined the reliable nature of that system.
82. On any graduated response to infringement, the letter continued:-
“We consider that such an approach would be inconsistent with the
recent re-introduction by the European Parliament of Amendment
138/46 to the current proposals to revise the European Telecoms
Regulations (which we understand are in principle supported by the
Irish Government), which will make it illegal for any EU member
state to introduce legislation that would allow a citizen’s internet
connection to be disconnected without first being found guilty in
court. This principal would also prevent any inter-industry
agreement that facilitated the disconnection of a citizen’s internet
access without a court order. As a result, there is no basis for your
client to pursue with other ISPs a graduated response system in
similar terms to that agreed with Eircom.
Our client takes the rights of its customers very seriously, including
in the areas of data protection and privacy. Our client will of course
comply with any court order your client’s may obtain in respect of a
particular customer of our client that is held to be infringing our
client’s copyright. In addition, in incidents where our client may
provide hosting facilities, our client will continue to comply and
enforce the applicable notify and take down policy in appropriate
circumstances.
42
injunction on the basis not of law but of economic abuse or moral turpitude
would lead the Court beyond the threshold of the judicial arm of
government and into legislation. It would undermine respect for the rule of
law: for no one would know quite what the rule of law might be if it
depended on attitudes forged through legal argument in individual cases
as to what was acceptable conduct. The danger that would arise would be
that the Court could then be described by reasonable people as acting on
the basis of preference, were the Court to use any wider and wrongly
assumed right to injunct behaviour in the same way that the tort of
conspiracy was historically used against trade union action by judges in
England in the late 19th and early 20th centuries, up to the passing of the
Trade Disputes Act 1906, and some would argue, beyond.
87. Therefore, the only proper response to this problem is to consider
the precise scope of the legislative framework as set out in the Act and
whatever aspect of European legislation might legitimately be used as an
aid in interpreting national law.
88. I therefore turn to the legislation.
European Obligations
101. I turn therefore to the obligations of the State as a member of the
European Union. In that regard, where a Directive places a legislative
obligation on the State, most especially where national legislation, as is
the case in relation to Act of 2000, is concerned to implement its terms
through choice of appropriate measures, that national legislation must be
construed so as to conform with its legislative purpose. Thus, a national
measure must be interpreted in accordance with the obligation of the
State to abide by European law. That obligation arises whether the
legislation was brought into law before or after a directive. This is made
clear by the judgment of the European Court in Marleasing SA v. La
Commercial Internacional de Alimentacion SA [1990] 4 E.C.R I-4135 (C-
106/89), where the European Court of Justice held, at pp. 4158-4159:-
"6. With regard to the question whether an individual may rely
on the directive against a national law, it should be observed that,
as the Court has consistently held, a directive may not of itself
impose obligations on an individual and, consequently, a provision
of a directive may not be relied upon as such against such a person
(judgment in Case 152/84 Marshall v Southampton and South-West
Hampshire Area Health Authority [1986] ECR 723).
7. However, it is apparent from the documents before the Court that
the national court seeks in substance to ascertain whether a
national court hearing a case which falls within the scope of
Directive 68/151 is required to interpret its national law in the light
of the wording and the purpose of that directive in order to preclude
a declaration of nullity of a public limited company on a ground
other than those listed in Article 11 of the directive.
8. In order to reply to that question, it should be observed that, as the
Court pointed out in its judgment in Case 14/83 Von Colson and
54
European Directives
105. First of all, insofar as it may be important, a brief chronology. The
Copyright and Related Rights Acts 2000, was passed on 10th July and
brought into force on 1st June 2001. At that time the E-Commerce
Directive, which I will shortly refer to by its full title, had been passed on
the 8th June 2000. Article 22 of that directive gave the State up to the 17 th
January 2002, to implement its terms. European Parliament and Council
Directive 2001/29/EC on the harmonisation of certain aspects of copyright
and related rights in the information society O.J. L167/10 (“The Copyright
Directive”) was passed on 22nd May 2001. It was in draft form, and in the
contemplation of the legislature, when they passed the Copyright and
Related Rights Act 2000. European Parliament and Council Directive
2002/21/EC on a common regulatory framework for electronic
communications networks or services O.J. 108/33 (“Framework Directive”)
was passed on 7th March 2002. The Communications Regulation Act 2002,
allowing for regulation of internet service providers by The Commission for
Communications Regulation, was passed in the year 2000. This was
followed by the European Community (Directive 2000/31 EC) Regulations
2003 (S.I. No. 68 of 2003).
106. European Parliament and Council Directive 2000/31/EC of 8 June
2000 on certain legal aspects of information society services, in particular
electronic commerce, in the Internal Market (Directive on Electronic
Commerce), O.J. L178/1 17.7.2000 (“the E-Commerce Directive”) provides
defences to internet service providers who transmit copyright material.
57
Other Jurisdictions
129. The Digital Millennium Copyright Act 2000 (“DMCA”) was enacted
in the United States of America to “criminalize circumventing copyright-
protection technology” and to punish online copyright infringement. In
particular the Act makes internet service providers liable for infringing
activity on their servers so as to stop illegal file-sharing. An internet
service provider is defined in 17 U.S.C. § 512(k) as being either “an entity
offering the transmission, routing, or providing of connections for digital
online communications, between or among points specified by a user…” In
a manner akin to the ‘mere conduit’ defence under European law § 512(h)
gives complete immunity from liability to internet service providers who
simply transmit information from user to user without caching. The Act
also authorises rights holders to serve a subpoena on the internet service
provider, asking it to identify the accused infringer. Liability can be
otherwise established, it seems, in U.S. law for participation in tort through
a failure to act appropriately. In the U.S. Supreme Court decision in Metro-
Goldwyn-Mayer Studios Inc. et al. v. Grokster, Ltd., et al. 545 (U.S.) 913
the Court held as follows:-
“When a widely shared product is used to commit infringement, it
may be possible to enforce rights in the protected work effectively
against all infringers, so that the only practical alternative is to go
against the devices’ distributor for secondary liability on a theory of
contributory or vicarious infringement. One infringes contributorily
by intentionally inducing or encouraging direct infringement, and
infringes vicariously by profiting from direct infringement while
declining to exercise the right to stop or limit it. Although “[t]he
Copyright Act does not expressly render anyone liable for
[another’s] infringement,” Sony, 464 U.S., at 434, these secondary
liability doctrines emerged from common law principles and are well
established in law, e.g., id., at 486. Pp 10-13.”
130. Of note from an Irish and European perspective is that fact that a
court order is required before an end-user’s access to the internet can be
79
website what swarms are active and what tracks are being offered, and
then join one of those swarms using the relevant software. Regrettably on
a full consideration of this matter, a blocking injunction is not available in
Irish law.
134. Were it available, I would grant it. Mr. Harrison, in evidence on
behalf of UPC indicated, how, through Eircom, when that access was
blocked, he readily found a way through. However, this took him twenty
minutes. Professor Nixon offered the opinion that such blocking was futile.
I do not agree. In the telecommunications industry it has been noted that
where an area moves from access to other areas, such as the Aran Islands
to Dublin, or the Aran Islands to New York, by dialling the operator, to
direct dial, that the improvement in service causes a leap in usage. This is
known as the service improvement jump. It must work in the opposite
situation. I would regard it as both educative and helpful to block Pirate
Bay were I enabled by the relevant legislation to do so. At the very least, it
declares that the activity is illegal. I cannot grant the injunction because I
have no legal power to do so.
Prior Judgments
135. There were two prior judgments of the Court in relation to issues
related to this case. In EMI Records (Ireland) Limited v. Eircom Limited
[2010] IEHC 108, (Unreported, High Court, Charleton J., 16th April, 2010),
as has been previously stated, a similar action had been brought against
Eircom, as the largest internet service provider in the State. This was
settled on the basis of a three strike policy that is fully set out in that
judgment. The Court was asked to determine the capability of aspects of
that settlement with the Data Protection Acts 1988-2003, three issues
having been raised in correspondence by the Data Protection
Commissioner. In the light of the evidence in this case, and the
conclusions that the Court has reached, the Court would wish to make it
clear that this judgment is unaffected. I have reconsidered it in the light of
the evidence and submissions in this case and I am of the view that the
judgment is correct.
136. A different conclusion arises in relation to the judgment of the Court
in EMI (Ireland) Limited v. Eircom Plc [2009] IEHC 411 (Unreported, High
Court, Charleton J., 24th July, 2009). That judgment was, as the first
81
Conclusion
138. Solutions are available to the problem of internet copyright piracy. It
is not surprising that the legislative response laid down in our country in
the Copyright and Related Rights Act 2000, at a time when this problem
was not perceived to be as threatening to the creative and retail economy
as it has become in 2010, has made no proper provision for the blocking,
diverting or interrupting of internet communications intent on breaching
copyright. In failing to provide legislative provisions for blocking, diverting
and interrupting internet copyright theft, Ireland is not yet fully in
compliance with its obligations under European law. Instead, the only
relevant power that the courts are given is to require an internet hosting
service to remove copyright material. Respecting, as it does, the doctrine
of separation of powers and the rule of law, the Court cannot move to
grant injunctive relief to the recording companies against internet piracy,
even though that relief is merited on the facts.
82